default search action
Hugo L. Jonker
Person information
- affiliation: Open University of the Netherlands, The Netherlands
- affiliation: Radbound University, Heerlen, Netherlands
- affiliation (former): University of Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Vincent van der Meer, Jeroen van den Bos, Hugo Jonker, Laurent Dassen:
Problem solved: A reliable, deterministic method for JPEG fragmentation point detection. Forensic Sci. Int. Digit. Investig. 48: 301687 (2024) - 2023
- [c34]Jelle Bouma, Hugo Jonker, Vincent van der Meer, Eddy Van Den Aker:
Reconstructing Timelines: From NTFS Timestamps to File Histories. ARES 2023: 154:1-154:9 - 2022
- [c33]Benjamin Krumnow, Hugo Jonker, Stefan Karsch:
How gullible are web measurement tools?: a case study analysing and strengthening OpenWPM's reliability. CoNEXT 2022: 171-186 - [c32]Christof Ferreira Torres, Hugo Jonker, Radu State:
Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts. RAID 2022: 115-128 - [i8]Zach Smith, Hugo Jonker, Sjouke Mauw, Hyunwoo Lee:
Modelling Agent-Skipping Attacks in Message Forwarding Protocols. CoRR abs/2201.08686 (2022) - [i7]Benjamin Krumnow, Hugo Jonker, Stefan Karsch:
Analysing and strengthening OpenWPM's reliability. CoRR abs/2205.08890 (2022) - 2021
- [j5]Stefano Calzavara, Hugo Jonker, Benjamin Krumnow, Alvise Rabitti:
Measuring Web Session Security at Scale. Comput. Secur. 111: 102472 (2021) - [c31]Luca Compagna, Hugo Jonker, Johannes Krochewski, Benjamin Krumnow, Merve Sahin:
A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence. EuroS&P Workshops 2021: 49-59 - [c30]Daniel Goßen, Hugo Jonker, Stefan Karsch, Benjamin Krumnow, David Roefs:
HLISA: towards a more reliable measurement tool. Internet Measurement Conference 2021: 380-389 - [i6]Christof Ferreira Torres, Hugo Jonker, Radu State:
Elysium: Automagically Healing Vulnerable Smart Contracts Using Context-Aware Patching. CoRR abs/2108.10071 (2021) - 2020
- [c29]Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. AsiaCCS 2020: 584-597 - [i5]Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. CoRR abs/2003.05987 (2020)
2010 – 2019
- 2019
- [c28]Christof Ferreira Torres, Mathis Baden, Robert Norvill, Hugo Jonker:
ÆGIS: Smart Shielding of Smart Contracts. CCS 2019: 2589-2591 - [c27]Hugo Jonker, Benjamin Krumnow, Gabry Vlot:
Fingerprint Surface-Based Detection of Web Bot Detectors. ESORICS (2) 2019: 586-605 - [c26]Vincent van der Meer, Hugo Jonker, Guy Dols, Harm M. A. van Beek, Jeroen van den Bos, Marko C. J. D. van Eekelen:
File Fragmentation in the Wild: a Privacy-Friendly Approach. WIFS 2019: 1-6 - [i4]Clayton Drazner, Nikola Duza, Hugo Jonker, Dan S. Wallach:
Investigating the effectiveness of web adblockers. CoRR abs/1912.06176 (2019) - 2018
- [c25]Christof Ferreira Torres, Hugo Jonker:
Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications. ESORICS (2) 2018: 60-80 - [i3]Hugo Jonker, Jelmer Kalkman, Benjamin Krumnow, Marc Sleegers, Alan Verresen:
Shepherd: Enabling Automatic and Large-Scale Login Security Studies. CoRR abs/1808.00840 (2018) - [i2]Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of an E-Health Protocol. CoRR abs/1808.08403 (2018) - 2017
- [j4]Naipeng Dong, Hugo L. Jonker, Jun Pang:
Formal modelling and analysis of receipt-free auction protocols in applied pi. Comput. Secur. 65: 405-432 (2017) - [c24]Giampaolo Bella, Denis Butin, Hugo Jonker:
Analysing Privacy Analyses. ITASEC 2017: 19-28 - [c23]Hugo Jonker, Sjouke Mauw:
A Security Perspective on Publication Metrics. Security Protocols Workshop 2017: 186-200 - [c22]Hugo Jonker:
A Security Perspective on Publication Metrics (Transcript of Discussion). Security Protocols Workshop 2017: 201-213 - [c21]Hugo Jonker, Sjouke Mauw, Tom Schmitz:
Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections. E-VOTE-ID 2017: 183-197 - 2016
- [c20]Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. Security Protocols Workshop 2016: 19-25 - [c19]Hugo Jonker:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion). Security Protocols Workshop 2016: 26-34 - 2015
- [c18]Christof Ferreira Torres, Hugo L. Jonker, Sjouke Mauw:
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting. ESORICS (2) 2015: 3-19 - [c17]Hugo Jonker, Sjouke Mauw, Sasa Radomirovic:
Location-Private Interstellar Communication. Security Protocols Workshop 2015: 105-115 - 2014
- [c16]Jannik Dreier, Hugo Jonker, Pascal Lafourcade:
Secure Auctions without Cryptography. FUN 2014: 158-170 - 2013
- [j3]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and verifiability in voting systems: Methods, developments and trends. Comput. Sci. Rev. 10: 1-30 (2013) - [c15]Jannik Dreier, Hugo Jonker, Pascal Lafourcade:
Defining verifiability in e-auction protocols. AsiaCCS 2013: 547-552 - [c14]Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo Jonker, Melanie Volkamer:
Modeling the German Legal Latitude Principles. ePart 2013: 49-56 - [c13]Naipeng Dong, Hugo Jonker, Jun Pang:
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. ESORICS 2013: 499-516 - [i1]Hugo Jonker, Sjouke Mauw, Jun Pang:
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends. IACR Cryptol. ePrint Arch. 2013: 615 (2013) - 2012
- [c12]Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of Privacy in an eHealth Protocol. ESORICS 2012: 325-342 - [c11]Denise Demirel, Hugo Jonker, Melanie Volkamer:
Random Block Verification: Improving the Norwegian Electoral Mix-Net. Electronic Voting 2012: 65-78 - 2011
- [c10]Hugo Jonker, Jun Pang:
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy. ARES 2011: 294-300 - [c9]Naipeng Dong, Hugo Jonker, Jun Pang:
Challenges in eHealth: From Enabling to Enforcing Privacy. FHIES 2011: 195-206 - 2010
- [c8]Lucie Langer, Hugo Jonker, Wolter Pieters:
Anonymity and Verifiability in Voting: Understanding (Un)Linkability. ICICS 2010: 296-310 - [c7]Naipeng Dong, Hugo L. Jonker, Jun Pang:
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. Formal Aspects in Security and Trust 2010: 223-238 - [c6]Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010: 98-114 - [c5]Hugo Jonker, Wolter Pieters:
Anonymity in Voting Revisited. Towards Trustworthy Elections 2010: 216-230
2000 – 2009
- 2009
- [j2]Hugo L. Jonker, Sjouke Mauw, Jun Pang:
A formal framework for quantifying voter-controlled privacy. J. Algorithms 64(2-3): 89-105 (2009) - [c4]Hugo L. Jonker, Sjouke Mauw, Jun Pang:
Measuring Voter-Controlled Privacy. ARES 2009: 289-298 - 2008
- [j1]Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker:
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme. Fundam. Informaticae 89(4): 393-417 (2008) - 2007
- [c3]Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker:
Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. FSEN 2007: 33-48 - [c2]Hugo L. Jonker, Melanie Volkamer:
Compliance of RIES to the Proposed e-Voting Protection Profile. VOTE-ID 2007: 50-61 - 2006
- [c1]Hugo L. Jonker, Erik P. de Vink:
Formalising Receipt-Freeness. ISC 2006: 476-488
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint